YoVDO

Mainframes - The Past Will Come Back to Haunt You

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Metasploit Courses Nessus Courses

Course Description

Overview

Explore the hidden world of mainframe security in this Black Hat USA 2013 conference talk. Delve into the often-overlooked realm of mainframe systems that power critical infrastructure across governments, military, airlines, and banks. Uncover the security implications of these powerful machines, addressing the knowledge gap between IT security professionals and mainframe experts. Learn about mainframe security implementation, including configuration file locations, access methods, networking commands, and file structures. Gain insights into TSO, JCL, REXX, and other mainframe-specific technologies. Discover how to navigate the mainframe environment, understand resource access control, and explore potential vulnerabilities. Examine topics such as password hashes, FTP servers, and low-level capabilities. Investigate tools and techniques for mainframe security testing, including Nessus and Metasploit. Consider the implications of running Linux on mainframes and methods for searching sensitive data. Bridge the gap between modern IT security practices and the enduring world of mainframe computing in this comprehensive exploration of a often-misunderstood technology landscape.

Syllabus

Disclaimer
Mainframe Legacy
Phil Her
The Big Thing
IBM Matrix
TSO
Executors Care
Interactive System
Datasets
The Next Life
Unit Environment
JCL
REX
Master Console
FTP Server
Bash Script
JCL File
Resource Access Control
Password hashes
Binary
Algorithm
Low Level Cap
I Series Testing
Nessus
The Devil
Another World Alone
psychotic
NCR
iPad Pastures
Not an Idea
Surfactant
Password sniffing
Andersonin
One Count
MTP
Secret Tool
FTP
Java
I am
MainTV
interpreterlife
Mainframe at Home
Hercules
System
Internet Census
Metasploit
Linux on mainframes
Searching for sensitive data
Conclusion


Taught by

Black Hat

Related Courses

Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security Chip
Black Hat via YouTube
Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube
AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube
Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube
Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube